Mobile Next is an MCP server for mobile development and automation. Prior to 0.0.50, the mobile_open_url tool in mobile-mcp passes user-supplied URLs directly to Android's intent system without any scheme validation, allowing execution of arbitrary Android intents, including USSD codes, phone calls, SMS messages, and content provider access. This vulnerability is fixed in 0.0.50.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-5qhv-x9j4-c3vm | @mobilenext/mobile-mcp: Arbitrary Android Intent Execution via mobile_open_url |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 07 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mobile-next
Mobile-next mobile-mcp |
|
| Vendors & Products |
Mobile-next
Mobile-next mobile-mcp |
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Mobile Next is an MCP server for mobile development and automation. Prior to 0.0.50, the mobile_open_url tool in mobile-mcp passes user-supplied URLs directly to Android's intent system without any scheme validation, allowing execution of arbitrary Android intents, including USSD codes, phone calls, SMS messages, and content provider access. This vulnerability is fixed in 0.0.50. | |
| Title | Mobile Next has Arbitrary Android Intent Execution via mobile_open_url | |
| Weaknesses | CWE-939 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-06T20:52:25.170Z
Reserved: 2026-04-02T17:03:42.074Z
Link: CVE-2026-35394
No data.
Status : Received
Published: 2026-04-06T21:16:21.300
Modified: 2026-04-06T21:16:21.300
Link: CVE-2026-35394
No data.
OpenCVE Enrichment
Updated: 2026-04-07T09:37:07Z
Weaknesses
Github GHSA